CYBER SECURITY TOPIC
Start by reading and following these instructions:
Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling.
Research (Weeks 2-3) To better understand the problem you wish to investigate for your capstone topic, you will need to review the research literature. Your project should include a review of the existing research on your topic and a discussion comparing this research to your project focus. The review should address what others have discovered or written about your topic and how the research helps you with investigating your capstone project.
Module 2 Assignment
Literature Review- Part 1: Annotated Bibliography
Due Week 2
For this step of your capstone project, you will need to complete an annotated bibliography related to your APPROVED TOPIC: CYBER SECURITY. Please refer to this link to learn more about the purpose and contents of the annotated bibliography: https://owl.purdue.edu/
Be sure to complete all three components of the annotated bibliography (summarize, assess, reflect). Your initial annotated bibliography should include 12-15 sources/references and should follow the APA writing style. References should be no older than five years, but classic texts that outline well-established theories may be included in three of the sources.
For those familiar with Excel, an Excel template is provided. You can use this template while researching each reference or use a text-based format as shown at the OWL at Purdue weblink: https://owl.purdue.edu/ Filling in a template as your research saves time when trying to find a specific reference during the writing phase.